Efficient and privacy-preserving butterfly counting on encrypted bipartite graphs

被引:0
|
作者
Pang, Xin [1 ]
Chen, Lanxiang [1 ,2 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] City Univ Macau, Fac Data Sci, Taipa 999078, Macao, Peoples R China
基金
中国国家自然科学基金;
关键词
Bipartite graphs; Structured encryption; Butterfly counting; Private set intersection;
D O I
10.1016/j.jisa.2024.103952
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bipartite graphs have numerous real-world applications, with the butterfly motif serving as a key higher order structure that models cohesion within these graphs. Analyzing butterflies is crucial fora comprehensive understanding of networks, making butterfly counting a significant focus for researchers. In recent years, various efficient methods for exact butterfly counting, along with sampling-based approximate schemes, have been proposed for plaintext bipartite graphs. However, these methods often overlook data privacy concerns, which are critical in real-world scenarios such as doctor-patient and user-item relationships. Additionally, traditional encryption methods do not work due to the nature of graph structures. To tackle these challenges, we propose two schemes for exact butterfly counting on encrypted b ipartite graphs (EB-BFC), enabling butterfly counting for specific vertices or edges to protect privacy of butterfly counting. Firstly, we demonstrate how structured encryption techniques could be used to encrypt the bipartite graph and construct a secure index, resulting in the efficient, privacy-preserving scheme EB-BFC1. Secondly, to ensure vertex data privacy, we propose a butterfly counting scheme based on Private Set Intersection, EB-BFC2. Finally, we demonstrate the security and efficiency of our proposed schemes through theoretical proofs and experiments on real-world datasets.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Families of Butterfly Counting Algorithms for Bipartite Graphs
    Acosta, Jay A.
    Low, Tze Meng
    Parikh, Devangi N.
    2022 IEEE 36TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW 2022), 2022, : 304 - 313
  • [22] Privacy-preserving Computation over Encrypted Vectors
    Hu, Rui
    Ding, Wenxiu
    Yan, Zheng
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [23] Privacy-Preserving SVM Computing in the Encrypted Domain
    Maekawa, Takahiro
    Kawamura, Ayana
    Kinoshita, Yuma
    Kiya, Hitoshi
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 897 - 902
  • [24] Enabling Privacy-Preserving K-Hop Reachability Query Over Encrypted Graphs
    Song, Yunjiao
    Ge, Xinrui
    Yu, Jia
    Hao, Rong
    Yang, Ming
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 893 - 904
  • [25] Privacy-Preserving Any-Hop Cover Shortest Distance Queries on Encrypted Graphs
    Zhao, Xueling
    Wang, Minghui
    Jia, Zhuliang
    Li, Shundong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 16517 - 16528
  • [26] Efficient and Privacy-Preserving Edit Distance Query over Encrypted Genomic Data
    Zheng, Yandong
    Lu, Rongxing
    Shao, Jun
    Zhang, Yonggang
    Zhu, Hui
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [27] An efficient privacy-preserving rank query over encrypted data in cloud computing
    Cheng, Fang-Quan
    Peng, Zhi-Yong
    Song, Wei
    Wang, Shu-Lin
    Cui, Yi-Hui
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (11): : 2215 - 2227
  • [28] Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Liu, Zhiquan
    Li, Hongwei
    Choo, Kim-Kwang Raymond
    Deng, Robert H. H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3921 - 3933
  • [29] Efficient and Privacy-preserving Online Face Recognition over Encrypted Outsourced Data
    Yang, Xiaopeng
    Zhu, Hui
    Lu, Rongxing
    Liu, Ximeng
    Li, Hui
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 366 - 373
  • [30] Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2604 - 2618